A Call to Action - Center

advertisement
January 2011
Privacy and Data Access in a World of Online Computing: A Call To Action
Executive Summary
A new generation of technologies is transforming the world of computing. The traditional model of
computing—with software running on a user’s own PC or a business’s on-site computers—is increasingly
being augmented by computing delivered as a service over the Internet to consumers, enterprises and
government users alike. Often called “cloud” computing, this model of computing gives all users greater
choice and flexibility while driving significant efficiency gains, lowering IT costs, and creating incentives
and online platforms for innovation. Cloud computing technologies, like earlier advances in IT, hold
great promise for spurring economic development and job growth.
However, the future of cloud computing is being threatened by a growing thicket of inconsistent legal
requirements. National governments are imposing conflicting legal obligations and asserting competing
claims of jurisdiction over user content and data held by online computing service providers. Divergent
rules on data privacy, data retention, law enforcement access to user data, censorship, national security,
and other issues are placing providers in an impossible, Catch-22 position, with several companies facing
protracted legal battles and substantial fines in foreign courts and threats of imprisonment for their
employees. This global legal quagmire jeopardizes long-term investment and innovation in cloud
computing. If companies are forced to store data locally to mitigate these jurisdictional conflicts, the
costs for investment and innovation in cloud computing will increase, many of the efficiency and
performance gains of cloud computing may be lost, and the benefits to users will be reduced.
Consumers and governments also have important interests at stake. Consumers, like businesses, have a
fundamental interest in knowing that their online data is subject to consistent, predictable privacy
protections. As consumers move their information from desktops to their phones or PDAs and into the
cloud, they want to know that it will be safe and protected. Consumer confidence in the security and
privacy of online computing will not exist, however, without clear and consistent rules governing who
may access the data and under what circumstances.
For their part, governments have interests in realizing the efficiencies and economic benefits that online
computing offers while also advancing the safety of the online environment and protecting government
and private-sector networks and assets. Safeguarding these interests in the emerging online computing
world presents significant challenges. In particular, governments must be able to support the
development and use of online computing while protecting the privacy and security of their citizens’
data. At the same time, governments also must grapple with the dynamic threats that the online
computing environment can present. The fact that these threats arise in an interconnected
environment—one in which there is a simultaneous diffusion and instant connection of data, a greater
ability for criminals to obscure their identities, and uncertainty over the application of traditional
notions of jurisdiction—can greatly complicate governments’ ability to lawfully access data for
legitimate law enforcement and national security purposes. These complications are amplified by
countries’ divergent legal rules, which make it more difficult for providers to respond quickly even to
government demands that are clearly legitimate.
Industry has been working hard to address these problems, and Microsoft has called for even greater
transparency around privacy and security in order to enhance users’ confidence in cloud computing. At
the same time, we recognize that industry cannot solve the problems alone, and we likewise have called
for responsible government action. In particular, it is essential that governments around the world step
in to harmonize existing rules and provide clear guidance on lawful government access to user data.
Globally consistent rules are vital to realizing the many benefits of cloud computing.
____________________________________________________________________________________
I.
The Shift to Online Computing and Its Benefits
Over the past several years, the Internet has radically redefined the way we communicate, access
content, and share information. Recent innovations in computing, however, combined with massive
investments in fundamental computing architectures and broadband networks, are ushering in a new
era of “online” or “cloud” computing.
Online computing allows users to access IT applications and computing resources over the Internet. This
gives users greater choice and flexibility by enabling them to combine the power and reliability of
software running on their own PC or other device with the ease and efficiency of computing delivered as
a service. While consumers have used online computing for years—through services such as online
email, blogging, social networking, and many others—businesses today are also turning to cloud
computing to augment their existing IT systems. Many enterprises use online services for business
processes such as customer relationship management, video conferencing, and website management,
and are likely to rely on cloud computing for a far greater range of services in the future.
The benefits for users of these new computing technologies include:

Greater efficiencies for organizations to customize and rapidly scale their IT systems for their
particular needs. With cloud computing, users pay only for the services they need, and they can
add or reduce computing capacity nearly instantaneously. For example, Domino’s Pizza receives 50
percent more orders on Super Bowl Sunday than it does at its next busiest time, a typical Friday
night. Rather than buy additional IT hardware to handle its Super Bowl demands—capacity which
would go unused the rest of the year—Domino’s Pizza turned to the cloud to handle its excess IT
needs for that day.

Better collaboration through “anytime, anywhere” access. Because cloud applications and data are
stored remotely, cloud users can share data from any location and any device that has an Internet
connection. In the London Borough of Lewisham, residents report graffiti or illegal dumping by
taking a photo on their mobile phone, then submitting the photo via a mobile application, text
message, or website. The web portal also allows residents to search for all reports in their
neighborhood and to see whether the problems have been addressed. The amount of graffiti has
dropped since the online reporting tool was launched, and the response time for handling
complaints has improved by 87 percent.

New opportunities for innovation as developers move to the new online computing paradigm. By
improving access to computing resources and reducing cost, cloud technologies lower barriers to
entry. This helps developers create new applications and helps entrepreneurs launch small
businesses. Software startup Sharpcloud uses common social-networking tools to create dynamic,
collaborative strategy roadmaps. Hosting its solution in the cloud allowed Sharpcloud to devote its
financial resources to developing a compelling service instead of buying and managing a server farm.
2
In partnership with Fujitsu, Sharpcloud’s strategy roadmaps have helped reduce project planning
time by 75 percent.
Like earlier advances in technology, cloud computing can spur economic growth and job creation by
helping businesses become more agile and their workers more productive. Cloud services could add
more than $166 billion in net new business revenues to the U.S. economy between 2010 and 2013.
Another estimate indicates that cloud computing could create between 300,000 and 1.5 million new
jobs in Europe in the next five years.
Cloud computing also has the potential to address pressing social challenges. In healthcare, for
example, cloud technologies have already helped the Cleveland Clinic improve the quality of care.
Patients with chronic health conditions, such as diabetes and heart disease, upload data from “at-home”
medical devices to personal health records accessible by doctors at the Cleveland Clinic. Because
physicians had more information about their patients’ vital signs and activity levels, they were better
positioned to advise patients about when to come in for an office visit. Timely office visits not only
create efficiency but also help avert medical emergencies.
On the environmental front, a cloud-based energy management service being developed by Microsoft
and Ford Motor Company will help owners of electrical vehicles save money by identifying the optimum
“off peak” times for charging their cars. The same service will also help utility companies determine
how to adjust the power grid to handle the increased demand. More efficient use of energy reduces
costs and allows all of us to meet our responsibilities to the environment.
Cloud computing will create similar benefits in education, workforce training, public safety, and other
areas. In education, for example, by tapping into applications and services offered through the cloud,
libraries and community centers in underserved communities will be able to access computer power and
information that today is financially or geographically out of reach. Cloud computing will also offer
school administrations the same cost savings, agility, choice, and access to cutting-edge computing that
are available to other organizations. This will open new opportunities for schools to expand the quality
and accessibility of education, particularly in remote and underserved communities.
To achieve these benefits, however, cloud computing providers must be able to operate datacenters in
multiple locations and to transfer data freely among them. This is necessary for several reasons:

Reliability. Enterprises will adopt online computing services only if they are extremely reliable.
To provide this reliability, providers need to be able to replicate data and applications across
multiple locations. Thus, in the event of a natural disaster or datacenter failure in one location,
customers’ applications and data will still be available from a different location.

Efficiency. To maximize efficiency, online computing providers need to be able to transfer
workloads and data in real time based on needs and available resources. For instance, during
the workday in one part of the world, providers must have the ability to shift computing
demand to datacenters where it is night (and where the local need for computing is less). The
ability to shift data and applications continually among datacenters is also necessary to avoid
under-utilization of datacenters, which can significantly drive up overall energy consumption.

Performance. Everyone has experienced the frustration of using an online service that is slow
or otherwise experiences delays. Although these delays can have many causes—such as
network congestion or slow servers—delays may also result from the fact that the service is
3
being provided from a datacenter that is located far away—a condition also known as latency.
The ability to locate datacenters in multiple locations and transfer data between them allows
providers to respond instantaneously to fluctuations in demand and thereby to reduce latency
and improve performance.
At the same time, to promote trust in cloud computing, providers also must be able to assure their
customers that their data will be kept private and secure. Data that cloud computing providers collect,
store, and process on behalf of their customers may be personal, confidential, or otherwise sensitive.
For consumers, this might include personal emails, photos, or videos, blog postings, or information
about their web surfing activities. For businesses, this might include documents or communications that
reveal trade secrets, competitively valuable information, and key assets (e.g., price lists, customer
contacts, business plans, etc.), while for governments this data might include personal information
collected from citizens (e.g., tax records), employee information and communications, or other
information that has been entrusted to government. Providers also may collect data such as a name
and address, billing and account information, and other personal data when a customer signs up for
service and, to manage services effectively and securely, often collect IP addresses, account activity, and
similar data. Ensuring the privacy and security of this information is paramount if cloud computing is to
reach its true potential.
II.
Conflicting Legal Rules Threaten the Growth of Online Computing
The ability of providers to live up to these user expectations regarding the privacy and security of their
information is critical, not only for the future of cloud computing, but also to protect fundamental rights
of privacy.
As providers process and store greater amounts of user data, however, they face a growing dilemma.
Governments, confronted with the challenge of online crime and the use of the Internet in connection
with threats to public safety or national security (e.g., cyber attacks or terrorist plots), increasingly are
focused on obtaining access to user content and other data held by these providers. Multiple
jurisdictions may have interest in a single matter, each seeking access to user information. There are,
however, no universally agreed upon rules governing such access by law enforcement. The result is that
service providers are increasingly subject to divergent rules and competing assertions of jurisdiction
over user content and data. While these rules take many forms, conflicts between them are being felt in
two distinct ways:

Conflicting claims of jurisdiction. Law enforcement in different countries often follow different
rules on the conditions under which they will assert jurisdiction over user data. Some regimes
determine that jurisdiction exists only if the data is physically stored in the country, while others
assert jurisdiction so long as the service in question is offered there or if the user to whom the data
relates resides there. Still others assert jurisdiction so long as the service provider has a place of
business in-country, regardless of where the data is located. Each jurisdiction also has its legal
standards and process for lawful access demands by law enforcement. Complying with a lawful
demand for user data in one jurisdiction may place a provider at risk of violating the privacy or other
laws of the jurisdiction where the data actually sits. Also, this global thicket of conflicting rules
makes it extremely difficult for providers to give their customers accurate and adequate notice of
the conditions under which their data might be accessed by law enforcement.
4

Inconsistent legal obligations. Differences in national rules on such issues as data privacy, data
retention, and law enforcement access also create conflicts among substantive legal obligations. For
instance, the disclosure of data to one government in response to a demand that is lawful under
that country’s rules may violate the privacy rules of another jurisdiction. Compliance with the data
retention rules of one country may be considered too long in another country and too short in a
third. Indeed, given the absence of a broad agreement among countries on data retention and data
access, it is plausible that a country could mandate the deletion of data about its own citizens stored
in another country, even though that country’s laws either permit or require that the data be
retained for a longer period. Another example arises in connection with so-called “blocking
statutes,” which impose civil or even criminal liability on a company if that company complies with
warrants, subpoenas, or court orders issued by a second country for access to data. If a company in
one country is served with a subpoena for user data located in a second country that has a blocking
statute, the company could be forced to choose between refusing to comply with the first country’s
subpoena (and potentially being held in contempt of court in that country) or violating the second
country’s blocking statute (and potentially facing penalties in that jurisdiction).
Many governments have attempted to establish procedures to avoid such conflicts, but the mechanisms
for doing so have not been successful in practice. In particular, it is not uncommon for a country to have
a number of bilateral Mutual Legal Assistance Treaties (MLATs) with other countries. MLATs are
intended to provide a government-to-government mechanism for obtaining access to data held in a
foreign country. The international judicial process of “letters rogatory” can serve the same function in
criminal cases where no MLAT exists, and in civil cases. These procedures, however, almost always are
too cumbersome and slow to be useful in fast-moving criminal investigations or other settings. This is
particularly true in the context of online crime, in which threats evolve quickly and the conduct and
evidence at issue can easily traverse multiple jurisdictions. Also, although nearly four dozen countries
have ratified and/or signed the Council of Europe’s Convention on Cybercrime, which seeks to expedite
the sharing of evidence on computer crimes, the Convention does not provide a mechanism for
resolving competing claims of jurisdiction over data or differences in substantive legal rules.
As a result, law enforcement in certain countries have begun to ignore these established procedures and
simply demand that local employers disclose data regardless of where it is located or to which
jurisdiction the relevant service is provided—demands that often are backed up by threats of fines or
even imprisonment. This places online computing providers in an untenable position. If they refuse to
disclose data stored abroad, they face punishment from local law enforcement. If they agree to disclose
the data, they face the risk not only of a significant loss of customer trust, but also the potential of
liability under the privacy regime or related laws of the jurisdiction where the data is stored. This Catch22 also can have unintended effects for governments with respect to their ability to access information
for law enforcement purposes. Specifically, service providers that are caught in the no-win situation
may be slower in responding to governments’ requests for access to data as they grapple with what to
do and how to strike the right compromise, however unlikely such a compromise may be.
There have been several examples of the serious threats these competing and, at times, conflicting
requirements can pose to service providers and the user data they possess:

Brazil. A Brazilian court demanded that Google turn over information related to users of its social
networking site, despite the fact that the information was stored in the United States. Google
reportedly insisted initially that the Brazilian government go through the U.S. judicial system to
5
obtain the data but nevertheless was ordered to disclose the data to Brazilian authorities or pay a
daily fine of $23,000 for noncompliance.

Italy. Italy imposes a 12-month data retention obligation on online service providers, while some
other countries, including some European countries, require that data be retained for a shorter
period of time. Some Italian prosecutors have interpreted Italy’s data retention law to apply to data
held by U.S. providers even if they do not store data in Italy. In fact, prosecutors have threatened
criminal proceedings to enforce compliance with their views.

India. Citing national security concerns, India pressured Research in Motion to set up servers in
India and to give government authorities the ability to monitor encrypted user
communications. The Indian government also claimed to have made similar demands of other
communication services, including Google and Skype. Although RIM maintains that the geographic
location of a server has no bearing on a government's ability to crack encrypted data, Indian experts
say that placing a server in India allows the government to access user content more easily, using
Indian laws, instead of waiting for the cooperation of a foreign company or government agency.
To encourage continued investment in cloud computing services, there must be greater clarity and
consistency on rules that will protect the privacy and security of user data while also ensuring legitimate
law enforcement needs are addressed.
III.
Industry Efforts to Cope With These Problems
Online computing providers have taken several steps to seek to resolve these dilemmas, or at least
lessen their impact. For example, when responding to a government demand to block content deemed
illegal in that country, Microsoft will, to the extent technically possible, block access only in the country
issuing the order while continuing to provide access to users in other countries. The company also
informs local users that access to the content was blocked due to a government demand. Other online
computing providers have taken similar steps. Google, for example, has a policy of blocking YouTube
videos that are clearly illegal in a particular country only to users in that country, but will continue to
allow users located elsewhere to access such videos.
Online computing providers also are investing considerable resources to ensure that their physical
operations and corporate structure minimize the problems posed by conflicting legal rules—often at the
expense of the efficiencies and other benefits cloud computing can provide. But these efforts cannot
entirely solve the problem—for both business and technical reasons, it simply is impractical to locate
servers in every jurisdiction or to strictly segregate data in multiple locations based on the presumed
location of users.
The leading private-sector effort in this area to date is the Global Network Initiative (GNI), which was
announced in late 2008 by a coalition of companies, investors, and human rights organizations. The GNI
promulgated voluntary guidelines for companies to follow in determining how to respond to
government demands for censorship or access to user data. Under these guidelines, participants in the
GNI—which include many of the leading global service providers—have agreed to require that
governments follow established domestic legal process, and to interpret government restrictions,
demands for user data, and jurisdictional claims narrowly so as to minimize the negative effects of such
demands on user-generated content.
6
Despite these important steps, the private sector alone cannot resolve these problems. Companies that
are physically present and operating in a jurisdiction have a legal obligation and practical imperative to
comply with local law and to accede to local law enforcement demands for user data. Their refusal to
do so can imperil their businesses and jeopardize the safety of their employees. These problems will
only grow as cloud computing becomes more popular. Failure to resolve these looming issues will pose
a serious crisis for industry, consumers, and governments alike, and risk the future expansion of the
Internet and the vast potential for innovation that is presented by the next generation of computing.
IV.
The Need for Government Leadership – A Call to Action
While industry must play its part, any long-term solution to the problem of conflicting jurisdictional
claims and inconsistent legal obligations ultimately requires leadership from governments. Delivering
clarity in this area undoubtedly poses challenges, but it also presents opportunities, since governments
that take the lead in resolving these issues are likely to have a significant advantage in promoting the
growth of online computing in their jurisdictions—and reaping the benefits these technologies offer for
job creation, productivity, and economic growth. There are several options worth exploring in this
regard:

A new multilateral framework. One ambitious, but also perhaps most effective, avenue for a
solution would be for governments to seek a multilateral framework on these issues in the form of a
treaty or similar international instrument. This could include updating an existing treaty (such as the
Convention on Cybercrime) or drafting a new one. While this option would undoubtedly require
significant diplomatic leadership and resources, it offers perhaps the best hope of addressing
legitimate government needs in a coherent fashion while ensuring that business and consumer
interests in privacy and freedom of expression are adequately met on a global scale. To initiate this
process, an entity such as the G8 or G20 could take up the issue, then ask the OECD, APEC, or a
similar multilateral organization to research the problems and make recommendations for how to
resolve them.

More active bilateral consultations. A less formal option would be for countries to engage
independently in consultations and consensus building on procedures for resolving data access and
censorship issues in ways that avoid conflicts. Even bilateral discussions on these issues will increase
awareness of the problems created by conflicting claims of jurisdiction and pave the way for a
longer-term, more formal solution. The law enforcement and diplomatic community in the United
States, EU member states, the Commonwealth countries, and other leading nations could lead such
consultations by: (1) engaging with their counterparts in other governments to resolve ongoing
issues where laws appear to conflict, with an aim toward creating a lasting solution to systemic
issues; and/or (2) signaling to industry a willingness to engage in government-to-government dialog
on a case-by-case basis when a company finds itself facing conflicting legal obligations.

Enhanced MLATs. Another option would be for individual governments to press for enhanced
MLATs with their MLAT partners. Specifically, MLAT signatories could seek to improve the speed
and effectiveness of assistance between them. While it is an open question whether this option
could provide a permanent solution to these issues, if such enhanced MLATs were pursued by the
United States, EU member states, the Commonwealth countries, and other leading nations, they
would at a minimum provide a vehicle for these governments to address the challenges facing
service providers in their respective countries.
7
To further advance consideration of such options, Microsoft has called for legislation in the United
States that would direct the U.S. Secretary of State to engage in efforts in the OECD and other fora to
promote consistency in laws regulating data privacy, security, and retention, as well as assertions of
jurisdiction over data by law enforcement and others.
Whatever option governments take, it is essential that these deliberations include not only
representatives from law enforcement and the justice system, but also representatives of industry,
consumer groups, and other interested stakeholders. Cloud computing will only reach its full potential if
providers can establish datacenters and offer services in multiple jurisdictions, without fear that each
step will invite competing claims of jurisdiction and government access to data. The rules must balance
the legitimate needs of law enforcement, industry, and users, and it is vital that all stakeholders are
represented in any deliberations.
V.
Conclusion
With the growth in online computing, increasing amounts of user data are being processed and
transferred across national borders. To take full advantage of online computing, users must be given
reliable assurances regarding the privacy and security of their online data, while providers of online
computing must be able to offer such assurances without fear of conflicting legal obligations. It is vital
that governments around the world engage on this issue and work with industry to adopt harmonized,
coordinated rules for access to, and the protection of, online data.
For more information please contact publicpolicy@microsoft.com or visit
www.microsoft.com/publicpolicy.
8
Download